


default search action
International Journal of Mobile Computing and Multimedia Communications, Volume 6
Volume 6, Number 1, 2014
- Bouchra Frikh
, Brahim Ouhbi:
Web Algorithms for Information Retrieval: A Performance Comparative Study. 1-16 - Stevan Novakov, Chung-Horng Lung, Ioannis Lambadaris, Nabil Seddigh:
A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection. 17-53 - Tarik Mountassir, Bouchaib Nassereddine
, Abdelkrim Haqiq
, Samir Bennani
:
Optimal Channel Assignment Algorithm for Least Interfered Wireless Mesh Networks. 54-67
Volume 6, Number 2, 2014
- Hirotsugu Matsukida, Yuta Mieno, Hiroyuki Fujioka:
Reconstructing Handwriting Character Font Models with Incorrect Stroke Order. 1-12 - Shinji Sakamoto
, Algenti Lala, Tetsuya Oda, Vladi Kolici
, Leonard Barolli
, Fatos Xhafa:
Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks: A Case Study for a Realistic Scenario. 13-21 - Guorui Sheng, Bo Yang:
An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts. 22-32 - Shigang Liu, Yali Peng, Guoyong Qiu, Xuanwen Hao:
A Local Statistical Information Active Contour Model for Image Segmentation. 33-49 - Alba Amato
, Salvatore Venticinque
, Beniamino Di Martino:
A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data. 50-67 - Jyh-Horng Wen, Jheng-Sian Li, Hsiang-Shan Hou, Cheng-Ying Yang:
Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode. 68-77
Volume 6, Number 3, 2014
- Saeed Ur Rehman
, Shafiq Alam
, Iman Tabatabaei Ardekani
:
An Overview of Radio Frequency Fingerprinting for Low-End Devices. 1-21 - Kan Chen, Bala Natarajan
:
MIMO-Based Secret Key Generation Strategies: Rate Analysis. 22-55 - E. Prince Edward
:
A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks. 56-74 - Wasan Shaker Awad, Hanin Mohammed Abdullah:
Improving the Security of Storage Systems: Bahrain Case Study. 75-105
Volume 6, Number 4, 2014
- Jianhua Fan, Qiping Wang, Xianglin Wei, Tongxiang Wang:
Jammer Location-Oriented Noise Node Elimination Method for MHWN. 1-19 - Yangguang Liu
, Yangming Zhou
, Shiting Wen
, Chaogang Tang:
A Strategy on Selecting Performance Metrics for Classifier Evaluation. 20-35 - Guomin Zhang, Zhanfeng Wang, Rui Wang, Na Wang, Chang-you Xing:
What is New about the Internet Delay Space? 36-55 - Qinghong Yang, Xiangquan Hu, Zhichao Cheng, Kang Miao:
Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders. 56-72 - Evgenia Novikova
, Igor V. Kotenko
, Evgenii Fedotov:
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services. 73-97 - Konstantin Borisenko, Ivan Kholod, Andrey Shorov:
Framework for Infrastructure Attack Modeling in Hybrid Networks. 98-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.